Re: ptrace/kmod exploit still works in 2.4.21?

Pete Taphouse (pete@bytemark.co.uk)
Wed, 18 Jun 2003 13:36:07 +0100


--Boundary-02=_6yF8+4DA2su/0LT
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Description: signed data
Content-Disposition: inline

On Wednesday 18 June 2003 12:38, you wrote:
> On ons, 2003-06-18 at 13:22, Pete Taphouse wrote:
> <snip FAQ>
>
> Check your exploit binary for the suid flag. If run successfully once on
> a older kernel, it cheats by setting suid root.
Doh! Apologies for time/space wastage.

Cheers,
=2D-=20
Peter Taphouse

Bytemark Hosting
http://www.bytemark-hosting.co.uk
tel. +44 (0) 8707 455 026

--Boundary-02=_6yF8+4DA2su/0LT
Content-Type: application/pgp-signature
Content-Description: signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQA+8Fy6IAZ7OKeBB58RApCwAJ99dd4ZNTXqqADQqydiM73ZzAiQLQCeKjeW
4/7KK+GAf3TjLYHrjQ7Gs5Q=
=e87H
-----END PGP SIGNATURE-----

--Boundary-02=_6yF8+4DA2su/0LT--

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/